PowerSchool hacker sentenced to 4 years in prison

A 19-year-old Massachusetts man who pleaded guilty to hacking the educational technology company PowerSchool was sentenced to four years in prison on Tuesday.

Matthew Lane, who demanded a ransom of $2.9 million from PowerSchool in exchange for not leaking personal data belonging to more than 70 million people, also was ordered to pay about $14 million in restitution and a $25,000 fine, according to court filings.

The hack and its aftermath cost PowerSchool more than $14 million, including the expense of identity theft monitoring for victims. Prosecutors had sought a seven-year sentence. 

Prosecutors told the judge that Lane acted out of greed and had a long history of hacking.

Personal data, including Social Security numbers, special education status and medical conditions for more than 60 million students and 9 million teachers, were exposed in the hack, which became public in January.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion

Next Post

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

Related Posts

Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack

Apple on Monday backported fixes for a recently patched security flaw that has been actively exploited in the wild. The vulnerability in question is CVE-2025-43300 (CVSS score: 8.8), an out-of-bounds write issue in the ImageIO component that could result in memory corruption when processing a malicious image file. "Apple is aware of a report that this issue may have been exploited in an
Read More

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According to the U.S. government, it's assessed to be a publicly-traded
Read More